WikiLeaks

From KeyWiki
Jump to navigation Jump to search
Wikileaks.png

WikiLeaks was launched in 2007 and is a not-for-profit media organisation which facilitates anonymous leaking of restricted or censored material of political, ethical, diplomatic or historical significance.[1][2]

About

WikiLeaks' stated goal is to bring important news and information to the public. They provide a secure and anonymous way for sources to leak information to their journalists, via an electronic drop box. They then publish original source material alongside their news stories so readers and historians alike can compare the two. They state,[2]

"The broader principles on which our work is based are the defence of freedom of speech and media publishing, the improvement of our common historical record and the support of the rights of all people to create new history. We derive these principles from the Universal Declaration of Human Rights. In particular, Article 19 inspires the work of our journalists and other volunteers. It states that everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers. We agree, and we seek to uphold this and the other Articles of the Declaration."

Roots

WikiLeaks also has roots in an influential 1990s discussion group, the Cypherpunk mailing list. “Cypherpunk”, formed from the words “cipher”, or code, and “cyberpunk”, a science fiction genre full of rogue hackers fighting corporate tyrants, indicates the members’ loose ideology -- that the anonymity and security provided by computerised cryptography (“crypto”) could create a new society free from coercion, a system know as crypto-anarchy.[3]

Many of us see strong crypto as the key enabling technology for a new economic and social system, a system which will develop as cyberspace becomes more important. A system which dispenses with national boundaries, which is based on voluntary (even if anonymous) free trade. At issue is the end of governments as we know them today... Strong crypto permits unbreakable encryption, unforgeable signatures, untraceable electronic messages, and unlinkable pseudonymous identities. This ensures that some transactions and communications can be entered into only voluntarily. External force, law, and regulation cannot be applied. This is "anarchy," in the sense of no outside rulers and laws.

The cypherpunks were ahead of their time, clearly anticipating Wikileaks’s use of anonymous, encrypted internet drop-boxes by 15 years or more -- but then Julian Assange was a regular poster to the list. The hacker community has created the future it used to speculate about.

In one notorious incident, cypherpunk Jim Bell published an essay entitled “Assassination Politics”, which discussed the creation of a completely anonymous site where users could sponsor the assassination of corrupt politicians. Bell was later jailed for spying on federal agents, themselves sent to spy on him for writing the essay.

Assange laid the philosophical groundwork for Wikileaks when he replied to "Assassination Politics" in his State and Terrorist Conspiracies:

How can we reduce the ability of a conspiracy to act? … We can split the conspiracy, reduce or eliminating important communication between a few high weight links or many low weight links. Traditional attacks on conspiratorial power groupings, such as assassination, have cut high weight links by killing, kidnapping, blackmailing or otherwise marginalizing or isolating some of the conspirators they were connected to... The more secretive or unjust an organization is, the more leaks induce fear and paranoia in its leadership and planning coterie. This must result in minimization of efficient internal communications mechanisms (an increase in cognitive “secrecy tax”) and consequent system-wide cognitive decline resulting in decreased ability to hold onto power as the environment demands adaption. Hence in a world where leaking is easy, secretive or unjust systems are nonlinearly hit relative to open, just systems. Since unjust systems, by their nature induce opponents, and in many places barely have the upper hand, mass leaking leaves them exquisitely vulnerable to those who seek to replace them with more open forms of governance.

The Iraq War Logs

On Oct. 22, 2010 WikiLeaks released the largest classified military leak in history. The 391,832 reports document the war and occupation in Iraq, from 1st January 2004 to 31st December 2009 (except for the months of May 2004 and March 2009) as told by soldiers in the United States Army. Each is a 'SIGACT' or Significant Action in the war. They detail events as seen and heard by the US military troops on the ground in Iraq and are the first real glimpse into the secret history of the war that the United States government has been privy to throughout.

The reports detail 109,032 deaths in Iraq, comprised of 66,081 'civilians'; 23,984 'enemy' (those labeled as insurgents); 15,196 'host nation' (Iraqi government forces) and 3,771 'friendly' (coalition forces). The majority of the deaths (66,000, over 60%) of these are civilian deaths.That is 31 civilians dying every day during the six year period. For comparison, the 'Afghan War Diaries', previously released by WikiLeaks, covering the same period, detail the deaths of some 20,000 people. Iraq during the same period, was five times as lethal with equivalent population size.[4]

External Links

References